Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance

Size: px
Start display at page:

Download "Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance"

Transcription

1 Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Metadata (SDSFIE-M): Implementation Guidance Version 1.0 (8 SEP 2015) Prepared By: The IGI&S Governance Group (IGG) for The Assistant Secretary of Defense (Energy, Installations & Environment) 2015

2 THIS PAGE IS INTENTIONALLY BLANK i

3 Executive Summary This document contains implementation guidance for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) - Metadata standard, or SDSFIE-M. SDSFIE-M is a community standard for geospatial metadata, registered in the DoD IT Standards Registry (DISR). SDSFIE-M is a profile of the National System for Geospatial-Intelligence (NSG) Metadata Foundation, or NMF. NMF is, in turn, a profile of ISO 19115:2003/Cor 1:2006 (Geographic Information Metadata). SDSFIE-M is applicable to (and mandated for use by) the Installation Geospatial Information and Services (IGI&S) user community, as defined in DoD Instruction (DoDI) This standard is intended to describe IGI&S spatial data holdings and services (e.g. those structured according to the Spatial Data Standard for Facilities, Infrastructure, and Environment-Vector (SDSFIE-V)). This document defines the general requirement for IGI&S metadata and expresses, as a series of rules, other implementation requirements for SDSFIE-M such as the need for metadata to be accessible, the requirement to establish milestones and deadlines for the implementation of SDSFIE-M mandated versions, and the need for Components to develop their own implementation plans. Information security is a very important topic with respect to metadata and this document provides rules concerning how information security markings shall be expressed for both metadata and the resources that the metadata describes. Geospatial metadata is best created and maintained via automated tools. This document includes a rule that any tool that is developed by an IGG member organization must conform to the rules defined in this guidance. 2

4 Revision History Description Date Version Initial IGG Approved Version 8 SEP

5 Table of Contents Executive Summary Overview Requirement for IGI&S Metadata Rules for Implementing SDSFIE-M Metadata and Resource Constraint Rules Overview Legal Constraints Security Constraints Classification Classification System User Note Handling Description Owner / Producer Dissemination Controls Atomic Energy Act Information Foreign Government Information (FGI) Distribution Statements Metadata Tools SDSFIE-M Metadata Style for ArcGIS References Definitions Abbreviations Versioning Lifecycle States

6 THIS PAGE IS INTENTIONALLY BLANK 5

7 1 Overview This document contains implementation guidance for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) - Metadata standard, or SDSFIE-M. SDSFIE-M is a community standard for geospatial metadata, registered in the DoD IT Standards Registry (DISR). SDSFIE-M is a profile of the National System for Geospatial-Intelligence (NSG) Metadata Foundation, or NMF. NMF is, in turn, a profile of ISO 19115:2003/Cor 1:2006 (Geographic Information Metadata). SDSFIE-M is applicable to (and mandated for use by) the Installation Geospatial Information and Services (IGI&S) user community, as defined in DoD Instruction (DoDI) This standard is intended to describe IGI&S spatial data holdings and services (e.g. those structured according to the Spatial Data Standard for Facilities, Infrastructure, and Environment-Vector (SDSFIE-V)). Geospatial data can take many forms, making rapid search and discovery difficult. This is the reason why DoD developed the SDSFIE-M standard. The structure of SDSFIE-M supports the goals of making IGI&S data discoverable by automated means, understandable to users, and thus more trusted for DoD missions and decision making. By making IGI&S data discoverable, understandable, and trusted we provide users and managers the data awareness they need to prevent duplication of data acquisition. This allows DoD to focus scarce resources on acquiring only that data which is truly needed, and focuses data maintenance effort where it will provide the most cost-effective benefit to the enterprise. 2 Requirement for IGI&S Metadata In accordance with DoDI and as implemented by DoDI (with respect to IGI&S), all DoD IT resources shall be made discoverable, understandable, and trusted to the extent allowed by law and policy. These policies also support the goals of several federal executive orders, including EO (as implemented by OMB Circular A-16) and a host of transparency and open government issuances (summarized in OMB Memorandum M-13-13, Open Data Policy Managing Information as an Asset ). DoDI furthermore establishes the requirement that all DoD activities implement the applicable standards cited in the DoD IT Standards Registry (DISR), and that all authoritative data sources (ADSs) must be registered in the DoD Data Services Environment (DSE). A key element of DSE registration is the filing of a DoD Metadata Search (DDMS) record, which is a subset of the elements contained in an SDSFIE-M record. Taken together these policies establish the mandate that DoD organizations which create or maintain IGI&S must conform to the SDSFIE standards that are registered in the DISR, including the SDSFIE-V and SDSFIE-M standards. SDSFIE-M records must be created for each applicable SDSFIE-compliant data set or geospatial service within DoD, and these records must be made discoverable within the Joint Information Enterprise as directed by the policy statements contained in DoDI SDSFIE-M records may also be created for other IGI&S data sets or services, at the discretion of the authoring organization. To maintain interoperability and to establish a coordinated approach to IGI&S, each DoD Component shall follow the common guidance contained in this document to implement SDSFIE-M. The key elements of this guidance include: General rules that govern the implementation of SDSFIE-M (section 3). 6

8 Rules and guidance pertaining specifically to metadata and resource constraints (section 4). Implementing guidance pertaining to automated metadata tools, specifically the SDSFIE- M Metadata Style for ArcGIS (section 5). Metadata implementation references (section 6). 3 Rules for Implementing SDSFIE-M The IGI&S Governance Group (IGG) shall govern the implementation of SDSFIE-M in accordance with these rules: Rule 3-1 Applicability 1) All DoD organizations subject to IGI&S standards (as defined in DoDI ) and that implement SDSFIE-M must conform to this implementation guidance. 2) This document (and its revisions) applies to all Mandated or Emerging versions of SDSFIE- M. It also applies to all Retired SDSFIE-M versions. See section 9 for the definition of Emerging, Mandated, and Retired. Rule 3-2 SDSFIE-M Versioning 1 1) SDSFIE-M shall employ a three-level version pattern where major, minor, and corrigendum versions are specified using integers, separated by periods (for example, 1.0.2). Until a corrigendum release exists, a two-level version pattern (for example, 1.1) will be used in practice. 2) Revisions of SDSFIE-M are defined as follows: a. A major revision re-structures metadata elements in such a way that would significantly change the organization of existing implementation files. This type of change might occur when revising SDSFIE-M to conform to a new ISO metadata standard. The initial version of a major revision has minor (and corrigendum) version set to zero. b. A minor revision is one where the changes do not significantly change the organization of existing implementation files. This type of change might occur when new capability is added to SDSFIE-M through the introduction of one or more new elements. For example, extending the MD_FeatureCatalogue element to include attribute, enumeration, and enumerant information will likely require a new minor revision. The version attribute shall use the Major.Minor version number initially set at 0 and shall be incremented after each minor version (e.g., 4.0 to 4.1). c. A corrigendum, defined as a bug-fix, is used to correct errors in previous versions with the same Major.Minor version designation. The version attribute shall use the 1 The process of creating a new version is outlined in the SDSFIE Governance Plan, Version 1.0, DISDI Program, May 13, 2014, 7

9 complete Major.Minor.Corrigendum version number initially set at 0 and shall be incremented after each bug fix (e.g., 4.0 to or to 4.1.3). 2 3) Only major and minor revisions will be considered as triggers for changing the specification s status in the DISR. 4) The IGG shall determine when to recommend changing the lifecycle status of a version to Emerging or Mandated. Rule 3-3 Mandated SDSFIE-M Version Milestones 1) As a condition of mandating an SDSFIE-M version, milestones and deadlines for the implementation of the standard shall be developed by the IGG. The IGG will forward these recommended milestones and deadlines to the ASD(EI&E) in accordance with DoDI The following milestones (each of which should have a deadline) are necessary, as a minimum: a) Completion (including IGG acceptance) of an implementation specification or SMIS. b) Development of implementation tools such as an ArcGIS Metadata Style, or equivalent. c) Completion of Component implementation plans as defined in rule 3-4. d) Milestone(s) for when all Components shall have complete metadata records for all applicable IGI&S data or services; this may be a sequence of milestones (e.g. percent completion goals) and may vary based on the type of data (i.e. vector, raster, services). Rule 3-4 Component Implementation Plans 1) Within nine months of a Major version being mandated, or six months of a Minor version, Components shall develop an SDSFIE-M implementation plan aligning to the milestones and deadlines developed under Rule 3-3. Components may use one or more documents, but must include the following content (often referred to as a plan of action and milestones or POAM): a) Metadata Development Plan and Schedule i) A high-level description of the plan for developing metadata for their undocumented or newly created data holdings. ii) A schedule for the metadata development. b) Metadata Migration Plan and Schedule i) A high-level description of the plan for migrating existing metadata from the current version (or a previous standard) to the new version. ii) A schedule for the metadata migration. 2 This versioning scheme is widely used for GEOINT standards and is specified in Policy Directives for Writing and Publishing OGC Standards, Section 13, Document r7, Open Geospatial Consortium, 15 June,

10 2) Components shall submit their implementation plans to the IGG Chair, who will review and validate that the plans conform to this implementation guidance. Initial review comments or validation will be returned within 30 days of submission. 3) After first informing the Component and allowing not less than two weeks for their response, the IGG Chair shall inform the IGG of the results of this review in a timely manner. 4) Components may formally request an exception to the required milestones and deadlines to the IGG Chair, who shall follow the consensus process defined in the SDSFIE Governance Plan. Rule 3-5 Existence of Metadata 1) All IGI&S data holdings shall be documented with SDSFIE-M compliant (the current DISR Mandated version) metadata unless the data is classified. a) This requirement is intended to apply to all vector and raster data produced directly by or for the Components, as well as geospatial services provided by them. b) This requirement is not intended to apply to data created for one-time, project-specific requirements (for example, those not standardized by SDSFIE). 2) Classified IGI&S data holdings shall be documented using NSG Metadata Foundation (NMF) compliant metadata (the current DISR Mandated version). 3) Metadata is required at the entity (feature or object type) level only. a) This requirement is not intended to apply to feature level metadata. Rule 3-6 Accessibility of Metadata; Support to Discovery 1) Components shall make metadata records accessible to the DoD IGI&S enterprise via the Defense Installations Spatial Data Infrastructure (DISDI) Program either statically or dynamically. 2) If the Component provides records statically, they shall be delivered annually as valid 3 SDSFIE-M XML (SMIS) documents to the DISDI Program for cataloging on the DISDI Portal. 3) If the Component provided records dynamically, they shall be maintained in an enterpriseaccessible catalog that is registered with and searchable from the DISDI Portal by federation or other technique. Rule 3-7 Component-level Governance 3 XML validation is the process of checking a document written in XML (extensible Markup Language) to confirm that it is both wellformed and also "valid" in that it follows a defined structure. A well-formed document follows the basic syntactic rules of XML, which are the same for all XML documents. Valid means that the XML document follows the structure of SMIS schema hosted at where version is the currently mandated version of the SMIS. This structural validation is determined using a validating parser or validation tool to read the document and compare it against the schema. 9

11 1) Component-level governance is the responsibility of the Component's IGI&S Program Manager. 2) A key element of the Component-level governance is the existence of written implementation guidance (may be part of the Component s SDSFIE-M implementation plan or other guidance) which has been reviewed and validated by the IGG Chair. Rule 3-8 SMIS Document Content 1) SDSFIE-M XML (SMIS) documents shall include all mandatory and applicable conditional elements. 4 Metadata and Resource Constraint Rules This section contains an explanation of and rules for the marking of metadata and resources with information about legal and security constraints. The security constraints apply only to UNCLASSIFIED data (see Rule 3-5.2). Additionally, the constraints are NOT intended to support an automated access determination Overview To document access and use requirements in SDSFIE-M, constraint information is used to describe the legal and security constraints placed on the resource as well as on the metadata itself. In other words, SDSFIE-M requires at least two constraints on the metadata and at least two constraints on the resource (one each for legal and security constraints). These must be included even if the constraint states that there is no actual constraint. 4.2 Legal Constraints 5 The legal constraint elements contain restrictions and legal prerequisites for access and use of the resource or metadata. Access constraints and use constraints are both drawn from a code list that details the type of restriction on access and use, respectively. The restriction types are copyright, license, US Privacy Act, intellectual property, simply restricted (e.g., for legal reasons), other restrictions, or no restriction. Also included in the security constraints are use limitations that are textual description of the legal constraint. Rule 4-1 Legal Constraints on Metadata and Resource 1) Legal constraints on both the metadata and the resource shall be documented using legal constraint elements. 4 While an eventual goal is to enable the automated access decision, it is just too early in the lifecycle of SDSFIE-M and its implementation to expect that these kind of decisions can be fully automated. Nevertheless, SDSFIE-M utilizes the same specifications that are implemented in other parts of DoD and the Intelligence Community so that our community is in alignment with the standards governing information systems marking and need-to-know. In the future, SDSFIE-M may likely be based on the XML Data Encoding Specification for Access Rights and Handling (ARH.XML) which encapsulates both ISM.XML and NTK.XML. 5 The legal rules are based on the metadata elements defined in the MD_LegalConstraints model from ISO

12 2) If there are no legal constraints on either the metadata or the resource, then the elements shall indicate the lack of a constraint. 4.3 Security Constraints 6 The security constraint elements contain handling restrictions imposed on the resource or metadata for national security or other concerns. Classification There are only three classification levels defined in EO 13526: CONFIDENTIAL, SECRET, and TOP SECRET. UNCLASSIFIED is a marking (not a classification level) that indicates the information does not meet the threshold for classification as defined in EO As stated in Rule 3-5.2, classified metadata and resources are documented using NMF and are outside the scope of this section. Rule 4-2 Classification of Metadata and Resource 1) The marking of SDSFIE-M metadata and resources shall be UNCLASSIFIED (per rule 3-5). 2) If the metadata or resource has multiple owner/producers, then the marking of SDSFIE-M metadata and resources shall be JOINT UNCLASSIFIED [LIST]. Where [LIST] pertains to a list of trigraph/tetragraph codes representing the owner/producer country[ies] or organization[s]. 3) A JOINT marking, must be accompanied by an AUTHORIZED FOR RELEASE TO [USA, LIST] or REL TO [USA, LIST] marking. Where [USA, LIST] pertains to the string that contains USA followed by a list of trigraph/tetragraph codes representing country[ies] or organization[s] that are approved to receive a release. 4) If the metadata or resource has an owner/producer of NATO or an ATOMAL marking, then the marking of SDSFIE-M metadata and resources shall be NATO UNCLASSIFIED. Classification System The classification system being used is the Intelligence Community Markings System, formerly known as US CAPCO. Despite this fact, the current version of NMF and SDSFIE-M both require a reference to US CAPCO. Rule 4-3 Classification System The classification system for SDSFIE-M shall be US CAPCO. 6 The security rules are based on the metadata elements defined in the MD_SecurityConstraints model from ISO and extended by the National System for Geospatial-Intelligence Metadata Foundation (NMF) NMF_SecurityContraints model. The NMF_SecurityContraints integrates the Intelligence Community Technical Specifications, XML Data Encoding Specification for Information Security Markings (ISM.XML) and XML Data Encoding Specification for Need-To-Know Metadata (NTK.XML). They are also based on the content of the Intelligence Community Markings System, Register and Manual (IC Markings, formerly the CAPCO Manual). 11

13 User Note A user note is optional and contains an explanation of the application of the legal constraints or other restrictions and legal prerequisites for obtaining and using the resource or metadata. Handling Description A handling description is optional and provides additional information about the restrictions on handling the resource or metadata. Owner / Producer The national government(s) or international organization(s) that have purview over the classification marking of an information resource or portion therein are the owner/producer(s). Rule 4-4 Owner/Producer 1) At least one owner/producer shall be indicated for the metadata and for the resource. 2) If more than one owner/producer is indicated, then the metadata or resource shall be given the classification JOINT UNCLASSIFIED [LIST]. Where [LIST] pertains to a list of trigraph/tetragraph codes representing the owner/producer country[ies] or organization[s]. 3) If more than one owner/producer is indicated and one of the owner/producers is NATO or the sole owner/producer is NATO, then the metadata or resource shall be given the classification NATO UNCLASSIFIED. 4) The owner/producer of the metadata and the resource need not be the same, although release decisions for jointly owned metadata or resources must be agreed and documented in an AUTHORIZED FOR RELEASE TO [USA, LIST] or REL TO [USA, LIST] marking. Where [USA, LIST] pertains to the string that contains USA followed by a list of trigraph/tetragraph codes representing country[ies] or organization[s] that are approved to receive a release. Dissemination Controls Dissemination Controls are control markings that identify the expansion or limitation on the distribution of information. These markings are in addition to and separate from the levels of classification defined by EO The metadata or the resource can have a Dissemination Control. Typically, the resource dissemination control will be more stringent than the metadata. The Dissemination Control markings possible in SDSFIE-M are divided into three groups, IC, non-ic, and other. Table 1 contains the allowable Dissemination Control markings along with their definition and Foreign Disclosure and Release (FD&R) possibility and is provided to guide users in selecting appropriate Dissemination Control markings. Table 1: Dissemination Control Markings Allowed in SDSFIE-M with FD&R Possibility Title Abbreviation Definition FD&R Possible FOR OFFICIAL USE ONLY Intelligence Community (IC) Dissemination Control Markings FOUO Intelligence marking used for UNCLASSIFIED official government information that is withheld from public release until approved for release by the originator. YES 12

14 CAUTION- PROPRIETARY INFORMATION INVOLVED PROPIN Marking used to identify information provided by a commercial firm or private source under an express or implied understanding that the information will be protected as a proprietary trade secret or proprietary data believed to have actual or potential value. This marking may be used on government proprietary information only when the government proprietary information can provide a contractor(s) an unfair advantage, such as US Government budget or financial information. DEA SENSITIVE DSEN Unclassified information originated by DEA that requires protection against unauthorized disclosure to protect sources and methods of investigative activity, evidence, and the integrity of pretrial investigative reports. FOREIGN INTELLIGENCE SURVEILLANCE ACT NOT RELEASABLE TO FOREIGN NATIONALS LIMITED DISTRIBUTION EXCLUSIVE DISTRIBUTION FISA NOFORN The Foreign Intelligence Surveillance Act (FISA) of 1978, as amended, prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between or among "foreign powers" on territory under United States control. The marking denotes the presence of FISA material. NOFORN is an explicit foreign release marking used to indicate the information may not be released in any form to foreign governments, foreign nationals, foreign organizations, or non-us citizens without permission of the originator and in accordance with provisions of DCID 6/7, ICD 403, NDP-1, and implementation guidance in IC Markings. Non-Intelligence Community (non-ic) Dissemination Control Markings LIMDIS EXDIS Marking used to identify unclassified maps, geospatial products and data sets, which the Secretary of Defense may withhold from public release. Release or disclosure of these products is limited to Department of Defense (DOD) and DOD contractors (including any sub-contractors), and, for national intelligence purposes, to the Director of National Intelligence (DNI), non-dod members of the Intelligence Community (IC), and the National Security Council (NSC), and, with permission from NGA, to other Federal Government departments and agencies. Contact NGA Disclosure and Release for further guidance at: NDRO@NGA.IC.GOV (Intelink- TS), NDRO@NGA.SMIL.MIL (Intelink-S), or NDRO@NGA.MIL. Information with exclusive distribution to officers with essential needto-know. This caption is used only for highly sensitive traffic between the White House, the Secretary, Deputy, or Under Secretaries of State and Chiefs of Missions. NO DISTRIBUTION NODIS This control is used only on messages of the highest sensitivity between the President, the Secretary of State, and Chief of Mission. No further dissemination is allowed to any other than the original addressee(s) without the approval of the Executive Secretary. SENSITIVE BUT UNCLASSIFIED SENSITIVE BUT UNCLASSIFIED NOFORN LAW ENFORCEMENT SENSITIVE SBU SBU NOFORN LES Administrative unclassified information originated from within the Department of State, which warrants a degree of protection and administrative control and meets criteria for exemption from mandatory public disclosure under the Freedom of Information Act. Administrative unclassified Information originated within the Department of State that warrants a degree of protection and administrative control, meets criteria for exemption from mandatory public disclosure under the Freedom of Information Act, and is prohibited for dissemination to non-us citizens. LES information is unclassified information originated by agencies or elements with law enforcement missions that may be used in criminal prosecution and that requires protection against unauthorized disclosure to protect sources and methods, investigative activity, evidence, or the integrity of pretrial investigative reports. Any law enforcement agency employee or contractor in the course of performing assigned duties may designate information as LES if authorized to do so pursuant to department specific policy and directives. YES YES NO NO YES YES NO YES NO YES 13

15 LAW ENFORCEMENT SENSITIVE NOFORN PROTECTED CRITICAL INFRASTRUCTURE INFORMATION SAFEGUARDS INFORMATION LES NOFORN PCII SGI LES NOFORN information is unclassified information originated by agencies with law enforcement missions that may be used in criminal prosecution and requires protection against unauthorized disclosure to protect sources and methods, investigative activity, evidence, or the integrity of pretrial investigative reports, and is prohibited from dissemination to foreign nationals. Any law enforcement agency employee or contractor in the course of performing assigned duties may designate information as LES NOFORN if authorized to do so pursuant to department-specific policies and directives. Other Dissemination Control Markings PCII is a category of Sensitive but Unclassified (SBU) information that is afforded protections from (a) disclosure under the Freedom of Information Act (FOIA) and similar State and local disclosure laws and (b) use in civil litigation or for regulatory purposes. The PCII Program is unique because it provides a method for critical infrastructure owners to submit information voluntarily to the Federal government that the government would not otherwise have access to. Once information is submitted and the PCII Program has validated it as PCII, Federal, State, and local government entities can use the information to protect the Nation s critical infrastructure. PCII is accessed only by authorized users who have a need-to-know specified PCII. SGI is a special category of sensitive, unclassified information required by Section 147 of the Atomic Energy Act to be protected. NO NO NO Rule 4-5 Dissemination Control Marking 1) All metadata and resources whose dissemination must be controlled shall use one or more of the Dissemination Control markings listed in Table 1. 2) All metadata and resources shall be marked with the least restrictive applicable Dissemination Control marking(s) possible, subject to the additional guidance found in IC Markings. 3) All metadata and resources with a Dissemination Control shall also include a Distribution Statement this is consistent with the Dissemination Control. For example, it is inconsistent to have a Dissemination Control and use Distribution A. Rule 4-6 FD&R Marking of Dissemination Controlled Information 1) All metadata and resources marked with any of the Dissemination Control markings listed in Table 1 with an affirmative FD&R possibility shall also be marked as NOFORN in the absence of a positive release determination by the originating agency. If a positive release determination is made by the originating agency, then the NOFORN marking shall be removed. 2) All metadata and resources marked with any of the Dissemination Control markings listed in Table 1 with a negative FD&R possibility shall also be marked as NOFORN. Atomic Energy Act Information Atomic Energy Act (AEA) information markings are used in SDSFIE-M to denote the presence of unclassified DoD Unclassified Controlled Nuclear Information (marked DOD UCNI or DCNI ) and DOE Unclassified Controlled Nuclear Information (marked DOE UCNI or UCNI ). DOD UCNI is unclassified information regarding security measures for the physical protection of DoD Special Nuclear Material (SNM), equipment or facilities. Material is designated as DOD UCNI only when it is determined that its unauthorized disclosure could reasonably be expected to have a significant adverse effect on the health and safety of the public or the common 14

16 defense and security by increasing significantly the likelihood of the illegal production of nuclear weapons or the theft, diversion or sabotage of DoD SNM, equipment or facilities. DOE UCNI applies to information that has been declassified or removed from the Restricted Data 7 (RD) category but may not be disseminated to the general public. Included are certain unclassified aspects of design of the nuclear production and utilization facilities; security measures for production/utilization facilities, nuclear material contained in such facilities, and nuclear material in transit; as well as unclassified design, manufacture, and utilization information of any atomic weapon or component. Rule 4-7 Atomic Energy Act Information Markings 1) Atomic Energy Act Information shall be marked with either DOD UNCI or DOE UNCI as appropriate. 2) A DOD UCNI or DOE UCNI marking requires that the information be handled as NOFORN when considering foreign disclosure and release, unless an affirmative decision has been made by the originating agency s FD&R authority. Foreign Government Information (FGI) Under EO 13526, Foreign Government Information is defined as: Information provided to the United States Government by a foreign government or governments, an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence; Information produced by the United States pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or Information received and treated as "Foreign Government Information" under the terms of a predecessor order. Foreign Government Information ( FGI ) markings are used in US products to denote the presence of classified or unclassified foreign owned or produced information, and the foreign source(s), if they may be acknowledged. These markings are used based on sharing agreements or arrangements with the source country or international organization. Rule 4-8 Foreign Government Information Markings 1) Foreign Government Information shall be marked with: a. FGI [LIST] ( [LIST] pertains to a list of trigraph/tetragraph codes representing the country[ies] or organization[s] of origin), or b. FGI (when country[ies] or organization[s] of origin must be concealed) 2) If the originating country allows further sharing by the United States, an AUTHORIZED FOR RELEASE TO [USA, LIST] or REL TO [USA, LIST] marking must be used. Where [USA, 7 Restricted Data is defined as all data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but must not include data declassified or removed from the Restricted Data category pursuant to Section 142 of the Atomic Energy Act of 1954, as amended. 15

17 LIST] pertains to the string that contains USA followed by a list of trigraph/tetragraph codes representing country[ies] or organization[s] that are approved to receive a release. 3) If the originating country prohibits further sharing by the United States, a NOFORN marking shall be used. Distribution Statements Rule 4-9 Use of Distribution Statements Metadata and resources shall be marked using the distribution statements defined by DoDI Although DoDI is only mandatory for marking and managing technical documents (including research, development, engineering, test, sustainment, and logistics information), it is widely used in the GEOINT community to mark GI&S data and products, a use which is not prohibited by the policy. The statements defined in DoDI are used to denote the extent to which they are available for secondary distribution, release, and dissemination without additional approvals or authorizations. Table 5 from , recreated for convenience below as Table 2, defines a series of distribution statements that are used to inform approved distribution and the reasons for those distribution decisions. Table 2: Distribution Statements and Their Corresponding Reasons for Use DISTRIBUTION A. Approved for public release: distribution unlimited. DISTRIBUTION B. Distribution authorized to U.S. Government agencies (reason) (date of determination). Other requests for this document shall be referred to (controlling DoD office). DISTRIBUTION C. Distribution authorized to U.S. Government agencies and their contractors (reason) (date of determination). Other requests for this document shall be referred to (controlling DoD office). DISTRIBUTION D. Distribution authorized to Department of Defense and U.S. DoD contractors only (reason) (date of determination). Other requests for this document shall be referred to (controlling DoD office). DISTRIBUTION E. Distribution authorized to DoD Components only (reason) (date of determination). Other requests for this document shall be referred to (controlling DoD office). DISTRIBUTION F. Further dissemination only as directed by (controlling office) (date of determination) or higher DoD authority. PUBLIC RELEASE. Reason A B C D E ADMINISTRATIVE OR OPERATIONAL USE: To protect technical or operational data or information from automatic dissemination under the International Exchange Program or by other means. This protection covers publications required solely for official use or strictly for administrative or operational purposes. This statement may apply to manuals, pamphlets, technical orders, technical reports, and other publications containing valuable technical or operational data. CONTRACTOR PERFORMANCE EVALUATION: To protect information in management reviews, records of contract performance evaluation, or other advisory documents evaluating programs of contractors. X X X X X X X 16

18 CRITICAL TECHNOLOGY: To protect information and technical data that advance current technology or describe new technology in an area of significant or potentially significant military application or that relate to a specific military deficiency of a potential adversary. Information of this type may be classified or unclassified. DIRECT MILITARY SUPPORT: The document contains export-controlled technical data of such military significance that release for purposes other than direct support of DoD-approved activities may jeopardize an important technological or operational military advantage of the United States, another country, or a joint U.S.-foreign program. Designation of such data is made by competent authority in accordance with Reference (d). EXPORT CONTROLLED: To protect information subject to the provisions of Reference (d). FOREIGN GOVERNMENT INFORMATION: To protect and limit distribution in accordance with the desires of and agreements with the foreign government that furnished the technical information. OPERATIONS SECURITY: To protect information and technical data that may be observed by adversary intelligence systems and determining what indicators hostile intelligence systems may obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries. PREMATURE DISSEMINATION: To protect patentable information on systems or processes in the development or concept stage from premature dissemination. PROPRIETARY INFORMATION: To protect information not owned by the U.S. Government and marked with a statement of a legal property right. This information is received with the understanding that it will not be routinely transmitted outside the U.S. Government. TEST AND EVALUATION: To protect results of test and evaluation of commercial products or military hardware when disclosure may cause unfair advantage or disadvantage to the manufacturer of the product. SOFTWARE DOCUMENTATION: To protect technical data relating to computer software that is releasable only in accordance with the software license in subpart of Reference (s). It includes documentation such as user or owner manuals, installation instructions, operating instructions, and other information that explains the capabilities of or provides instructions for using or maintaining computer software. SPECIFIC AUTHORITY: To protect information not specifically included in the above reasons, but which requires protection in accordance with valid documented authority (e.g., Executive orders, statutes such as Atomic Energy Federal regulation). When filling in the reason, cite Specific Authority (identification of valid documented authority). VULNERABILITY INFORMATION: To protect information and technical data that provides insight into vulnerabilities of U.S. critical infrastructure, including DoD warfighting infrastructure, vital to National Security that are otherwise not publicly available. X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X 17

19 5 Metadata Tools The DISDI Program and Components may develop and disseminate tools that support the implementation of SDSFIE-M (and metadata generally) across the IGI&S community. This implementation guidance does not make any one tool mandatory for use by all Components primarily because the IGI&S community uses multiple software vendors and different vendors handle metadata differently. Rule 5-1 Tools Must Conform Any tool that is developed by any IGG member organization for the implementation of SDSFIE- M shall conform to the rules defined in this guidance. 5.1 SDSFIE-M Metadata Style for ArcGIS The DISDI Program has developed a metadata style for use with the Esri ArcGIS platform and plans to continue updating it, subject to availability of resources. A metadata style configures ArcGIS to create metadata according to a particular metadata standard and workflow. Choosing a metadata style is like applying a filter to an item's metadata. The style controls how you view the metadata and also the pages that appear for editing metadata in the Description tab in ArcGIS. The SDSFIE-M Metadata Style for ArcGIS is designed to support SDSFIE Metadata Implementation Schema (SMIS). Therefore, the style will determine how metadata is exported and validated for SDSFIE-M. 6 References The following referenced documents provide the background for SDSFIE-M and these implementation guidelines. SDSFIE Metadata (SDSFIE-M): Conceptual Schema, version 1.0.2, 28 AUG 2014, SDSFIE Metadata (SDSFIE-M): Implementation Specification (SMIS), version 1.0.2, 28 AUG 2014, Executive Order 13526, Classified National Security Information, 29 DEC 2009, eo13526.pdf DODI , Distribution Statements on Technical Documents, 23 AUG 2012, National Counterintelligence and Security Center (NCSC), Special Security Directorate (SSD), Security Markings Program (SMP), Intelligence Community Markings System, Register and Manual, 30 DEC 2014, pec%20policy%20regs/policy/capco/2014-dec-30- IC_Marking_System_Register_Manual/CleanedIC_Markings_System_Register_and_Ma nual_fouo_december2014.pdf [Requires Valid PKI Certificate (i.e. DOD CAC, FED PIV)] 18

20 Executive Order 13642, Making Open and Machine Readable the New Default for Government Information, 9 MAY 2013, 14/pdf/ pdf Office of Management and Budget Memorandum M-13-13, Open Data Policy-Managing Information as an Asset, 9 MAY 2013, 7 Definitions This section provides definitions for terms used in this document. Component A Military Department, Defense Agency, DoD Field Activity, or organization within the Office of the Secretary of Defense IGI&S Programs The DoD Component headquarters level activities responsible for oversight, policy, and guidance pertaining to installation geospatial information and services. Implementation The creation and maintenance of metadata for geographic information system data holdings. Implementation Compliance Compliance is measured with respect to a metadata standard. An Implementation is considered compliant if metadata documents can be generated that validate against the SMIS schema for the currently mandated version of SDSIFE-M. 8 Abbreviations ASD (EI&E) Assistant Secretary of Defense (Energy, Installations & Environment) CIP Common Installation Picture CMP Change Management Process COI Community of Interest DISDI Defense Installations Spatial Data Infrastructure DISR Department of Defense Information Technology Standards Registry DoD Department of Defense DOE Department of Energy DoDI Department of Defense Instruction EI&E Energy, Installations & Environment GEOINT Geospatial Intelligence IGI&S Installation Geospatial Information & Services IGG IGI&S Governance Group ISO International Organization for Standardization 19

21 IT Information Technology NMF National System for Geospatial-Intelligence (NSG) Metadata Foundation NSG National System for Geospatial-Intelligence RD Restricted Data SDSFIE Spatial Data Standards for Facilities, Infrastructure, and Environment SDSFIE-M SDSFIE Metadata SDSFIE-V SDSFIE Vector SMIS SDSFIE Metadata (or SDSFIE-M) Implementation Specification UCNI Unclassified Controlled Nuclear Information XML Extensible Markup Language 9 Versioning Lifecycle States The following set of versioning lifecycle states if taken from the SDSFIE Governance Plan and is repeated here for the convenience of the reader. 1) Emerging a) The version is created and approved but it is not yet Mandated. The version is expected to be Mandated within one to two years. Because each case may be unique, implementing organizations should consider the potential compatibility risks and impacts before considering whether to upgrade to an Emerging standard. For example, upgrading to a minor version may involve less risk than to a major version. The version may be implemented, but not in lieu of Mandated version. 2) Mandated a) The version is to be implemented and considered essential for interoperability in the IGI&S community. The milestones and deadlines for implementation of the Mandated version shall be developed by the IGG and approved by ASD (EI&E) in accordance with emerging DoD policy (DoDI 8130.AB). 3) Retired A version that is no longer Mandated because a new version has been Mandated. Continued use of the Retired version may be allowed if the Component is still in the process of migrating to the mandated version. An implementation plan with milestones may be required by the IGG. 20

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Governance Plan. Revision 2 13 September 2017

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Governance Plan. Revision 2 13 September 2017 Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Governance Plan Revision 2 13 September 2017 Prepared By: The Installation Geospatial Information and Services (IGI&S) Governance

More information

A Metadata Standard for IGI&S: Spatial Data Standards for Facilities, Infrastructure, and Environment - Metadata (SDSFIE-M)

A Metadata Standard for IGI&S: Spatial Data Standards for Facilities, Infrastructure, and Environment - Metadata (SDSFIE-M) A Metadata Standard for IGI&S: Spatial Data Standards for Facilities, Infrastructure, and Environment - Metadata (SDSFIE-M) Mr. David LaBranche, PE DISDI Program Manager ODUSD(I&E) July 15, 2014 ESRI IUC

More information

SDSFIE Quality (SDSFIE-Q)

SDSFIE Quality (SDSFIE-Q) Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Quality (SDSFIE-Q) 12 December 2016 Prepared By: The Installation Geospatial Information and Services Governance Group

More information

Installation Geospatial Information and Services (IGI&S) - Update on Policy, Standards, Issues

Installation Geospatial Information and Services (IGI&S) - Update on Policy, Standards, Issues Installation Geospatial Information and Services (IGI&S) - Update on Policy, Standards, Issues Mr. David LaBranche, PE Geospatial Information Officer OASD(EI&E) February 14, 2017 Agenda IGI&S Policy Implementation

More information

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Vector (SDSFIE-V): Implementation Guidance

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Vector (SDSFIE-V): Implementation Guidance Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) SDSFIE Vector (SDSFIE-V): Implementation Guidance Version 4.0 (31 JANUARY 2017) Prepared By: The IGI&S Governance Group For:

More information

Why is the CUI Program necessary?

Why is the CUI Program necessary? Why is the CUI Program necessary? Executive departments and agencies apply their own ad-hoc policies and markings to unclassified information that requires safeguarding or dissemination controls, resulting

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015

NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 NISP Update NDIA/AIA John P. Fitzpatrick, Director May 19, 2015 Agenda Cybersecurity Information Sharing and the NISP NISP Working Group Update CUI Program Update 2 Executive Order 13691 Promoting Private

More information

Safeguarding Unclassified Controlled Technical Information

Safeguarding Unclassified Controlled Technical Information Safeguarding Unclassified Controlled Technical Information (DFARS Case 2011-D039): The Challenges of New DFARS Requirements and Recommendations for Compliance Version 1 Authors: Justin Gercken, TSCP E.K.

More information

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER

OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE INTELLIGENCE COMMUNITY POLICY MEMORANDUM NUMBER 2007-500-3 SUBJECT: (U) INTELLIGENCE INFORMATION SHARING A. AUTHORITY: The National Security Act of 1947,

More information

Committee on National Security Systems. CNSS Policy No. 14 November 2002

Committee on National Security Systems. CNSS Policy No. 14 November 2002 Committee on National Security Systems CNSS Policy No. 14 November 2002 National Policy Governing the Release of Information Assurance (IA) Products and Services to Authorized U.S. Persons or Activities

More information

SAC PA Security Frameworks - FISMA and NIST

SAC PA Security Frameworks - FISMA and NIST SAC PA Security Frameworks - FISMA and NIST 800-171 June 23, 2017 SECURITY FRAMEWORKS Chris Seiders, CISSP Scott Weinman, CISSP, CISA Agenda Compliance standards FISMA NIST SP 800-171 Importance of Compliance

More information

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries

More information

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE. Office of the Press Secretary EXECUTIVE ORDER THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE May 11, 2017 EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Executive Order 13556

Executive Order 13556 Briefing Outline Executive Order 13556 CUI Registry 32 CFR, Part 2002 Understanding the CUI Program Phased Implementation Approach to Contractor Environment 2 Executive Order 13556 Established CUI Program

More information

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER

THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER FOR IMMEDIATE RELEASE May 11, 2017 THE WHITE HOUSE Office of the Press Secretary EXECUTIVE ORDER - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority

More information

Outline. Why protect CUI? Current Practices. Information Security Reform. Implementation. Understanding the CUI Program. Impacts to National Security

Outline. Why protect CUI? Current Practices. Information Security Reform. Implementation. Understanding the CUI Program. Impacts to National Security Outline Why protect CUI? Impacts to National Security Current Practices CUI Program & Existing Agency Practices Information Security Reform CUI Registry 32CFR2002 NIST SP 800-171 (Rev 1) Federal Acquisition

More information

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER [13800] - - - - - - - STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS

More information

GEOFidelis SDSFIE Implementation Roles and Responsibilities Guide

GEOFidelis SDSFIE Implementation Roles and Responsibilities Guide GEOFidelis SDSFIE Implementation Roles and Responsibilities Guide Version: 1.4 Prepared for: USMC Installation Geospatial Information and Services Program (GEOFidelis) November 19th, 2012 TABLE OF CONTENTS

More information

Managing the Intelligence Community Information Environment

Managing the Intelligence Community Information Environment Managing the Intelligence Community Information Environment A. AUTHORITY: The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended, and other applicable provisions oflaw. B.

More information

Open Data Policy City of Irving

Open Data Policy City of Irving Open Data Policy City of Irving 1. PURPOSE: The City of Irving is committed to fostering open, transparent, and accessible city government, and recognizes that by sharing data freely, the city will generate

More information

ISOO CUI Overview for ACSAC

ISOO CUI Overview for ACSAC ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

George W. Bush Presidential Library and Museum 2943 SMU Boulevard, Dallas, Texas

George W. Bush Presidential Library and Museum 2943 SMU Boulevard, Dallas, Texas George W. Bush Presidential Library and Museum 2943 SMU Boulevard, Dallas, Texas 75205 www.georgewbushlibrary.smu.edu ELECTRONIC RECORDS at the George W. Bush Presidential Library The Electronic Records

More information

The Spatial Data Standards for Facilities, Infrastructure and Environment (SDSFIE) Quality and Raster Standards

The Spatial Data Standards for Facilities, Infrastructure and Environment (SDSFIE) Quality and Raster Standards The Spatial Data Standards for Facilities, Infrastructure and Environment (SDSFIE) Quality and Raster Standards Ms. Karen Barnhouse DISDI Program Support OASD(EI&E) June 29, 2016 Agenda What is the SDSFIE

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

DFARS Defense Industrial Base Compliance Information

DFARS Defense Industrial Base Compliance Information DFARS 252.204-7012 Defense Industrial Base Compliance Information Protecting Controlled Unclassified Information (CUI) Executive Order 13556 "Controlled Unclassified Information, November 2010 Established

More information

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012)

National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) National Data Sharing and Accessibility Policy-2012 (NDSAP-2012) Department of Science & Technology Ministry of science & Technology Government of India Government of India Ministry of Science & Technology

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Safeguarding of Unclassified Controlled Technical Information. SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013)

Safeguarding of Unclassified Controlled Technical Information. SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013) Page 1 of 7 Section O Attach 2: SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013) 252.204-7012 Safeguarding of Unclassified Controlled Technical Information. As prescribed in 204.7303,

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

2018 SRAI Annual Meeting October Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA

2018 SRAI Annual Meeting October Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA 2018 SRAI Annual Meeting October 27-31 Dana Rewoldt, CRA, Associate Director of OIPTT, Iowa State University, Ames, IA, USA Controlled Unclassified Information Regulations: Practical Processes and Negotiations

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST

More information

Critical Cyber Asset Identification Security Management Controls

Critical Cyber Asset Identification Security Management Controls Implementation Plan Purpose On January 18, 2008, FERC (or Commission ) issued Order. 706 that approved Version 1 of the Critical Infrastructure Protection Reliability Standards, CIP-002-1 through CIP-009-1.

More information

As required by Executive Order 13526, Classified National Security Information, December 29, 2009, and 32 C.F.R. Part 2001, ISOO Implementing

As required by Executive Order 13526, Classified National Security Information, December 29, 2009, and 32 C.F.R. Part 2001, ISOO Implementing As required by Executive Order 13526, Classified National Security Information, December 29, 2009, and 32 C.F.R. Part 2001, ISOO Implementing Directive, effective June 25, 2010 This page left blank. Introduction

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM

FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM FLORIDA S PREHOSPITAL EMERGENCY MEDICAL SERVICES TRACKING & REPORTING SYSTEM END USER SECURITY POLICY MANUAL 1 INTRODUCTION... 3 2 INFORMATION USAGE AND PROTECTION... 3 2.2 PROTECTED HEALTH INFORMATION...

More information

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO

PROCEDURE POLICY DEFINITIONS AD DATA GOVERNANCE PROCEDURE. Administration (AD) APPROVED: President and CEO Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act (RSA 2000 ca-18); Copyright Act, R.S.C., 1985, c.c-42; Electronic Transactions

More information

UNCONTROLLED IF PRINTED

UNCONTROLLED IF PRINTED 161Thorn Hill Road Warrendale, PA 15086-7527 1. Scope 2. Definitions PROGRAM DOCUMENT PD 1000 Issue Date: 19-Apr-2015 Revision Date: 26-May-2015 INDUSTRY MANAGED ACCREDITATION PROGRAM DOCUMENT Table of

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

UCOP ITS Systemwide CISO Office Systemwide IT Policy

UCOP ITS Systemwide CISO Office Systemwide IT Policy UCOP ITS Systemwide CISO Office Systemwide IT Policy Revision History Date: By: Contact Information: Description: 08/16/17 Robert Smith robert.smith@ucop.edu Initial version, CISO approved Classification

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 3 - Data Classification Processes and Models. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 3 - Data Classification Processes and Models Readings In the News MIS5206 Week 3 Data Classification Processes and Models Test Taking Tip Quiz Readings Vacca Chapter

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

DoD Internet Protocol Version 6 (IPv6) Contractual Language

DoD Internet Protocol Version 6 (IPv6) Contractual Language DoD Internet Protocol Version 6 (IPv6) Contractual Language 1. Purpose: Contents of this document shall be incorporated in Government Acquisition Programs, Procurements, Services, and Contracts (including

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

MISB RP September Security Metadata Universal and Local Sets for Digital Motion Imagery. 1. Scope. 2. References

MISB RP September Security Metadata Universal and Local Sets for Digital Motion Imagery. 1. Scope. 2. References Motion Imagery Standards Board Recommended Practice: Security Metadata Universal and Local Sets for Digital Motion Imagery MISB RP 0102.3 12 September 2007 1. Scope This Recommended Practice (RP) describes

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 January 23, 2015 Federal Energy Regulatory Commission Order No. 791 January 23, 2015 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

MISB RP May Security Metadata Universal and Local Sets for Digital Motion Imagery. 1. Scope. 2. References

MISB RP May Security Metadata Universal and Local Sets for Digital Motion Imagery. 1. Scope. 2. References Motion Imagery Standards Board Recommended Practice: Security Metadata Universal and Local Sets for Digital Motion Imagery MISB RP 0102.5 15 May 2008 1. Scope This Recommended Practice (RP) describes the

More information

MasterCard NFC Mobile Device Approval Guide v July 2015

MasterCard NFC Mobile Device Approval Guide v July 2015 MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional

More information

- Cyber threat information: information directly pertaining to,

- Cyber threat information: information directly pertaining to, WHAT INFORMATION MAY BE SHARED H.R. 3674, the PRECISE Act of 2011, as reported from HHSC Subcmte on Cybersecurity (Lungren) law, H.R. 3523, the Cyber Intelligence sharing and Protection Act of 2011, as

More information

-Eight types of cyber data, (Sec. 708(7))

-Eight types of cyber data, (Sec. 708(7)) WHAT INFORMATION MAY BE SHARED H.R. 624, the Cyber Intelligence sharing and Protection Act of 2013 (CISPA) (Rogers- -Notwithstanding any provision of law, S. 3414, the Cybersecurity Act of 2012 (Lieberman-Collins-

More information

2013 US State of Cybercrime Survey

2013 US State of Cybercrime Survey 2013 US State of Cybercrime Survey Unknown How 24 % Bad is the Insider Threat? Insiders 51% 2007-2013 Carnegie Mellon University Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

Course No. S-3C-0001 Student Guide Lesson Topic 5.1 LESSON TOPIC 5.1. Control Measures for Classified Information

Course No. S-3C-0001 Student Guide Lesson Topic 5.1 LESSON TOPIC 5.1. Control Measures for Classified Information REFERENCES LESSON TOPIC 5.1 Control Measures for Classified Information SECNAV M-5510.36, Chapters 2, 7, 9 and 10 SECNAV M-5510.30, Chapter 3 LESSON A. Basic Policy (ISP 7-2) 1. Classified information

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

DATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury

DATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information

More information

fips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology

fips185 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 185 1994 February 9 U.S. DEPARTMENT OF COMMERCE/National Institute of Standards and Technology ESCROWED ENCRYPTION STANDARD CATEGORY: TELECOMMUNICATIONS

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

ISO INTERNATIONAL STANDARD. Information and documentation Managing metadata for records Part 2: Conceptual and implementation issues

ISO INTERNATIONAL STANDARD. Information and documentation Managing metadata for records Part 2: Conceptual and implementation issues INTERNATIONAL STANDARD ISO 23081-2 First edition 2009-07-01 Information and documentation Managing metadata for records Part 2: Conceptual and implementation issues Information et documentation Gestion

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:

More information

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges Pennsylvania ehealth Partnership Authority Pennsylvania s Journey for Health Information Exchange CERT Symposium: Cyber Security Incident Management for Health Information Exchanges June 26, 2013 Pittsburgh,

More information

NIST Special Publication

NIST Special Publication NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Ryan Bonner Brightline WHAT IS INFORMATION SECURITY? Personnel Security

More information

Article I - Administrative Bylaws Section IV - Coordinator Assignments

Article I - Administrative Bylaws Section IV - Coordinator Assignments 3 Article I - Administrative Bylaws Section IV - Coordinator Assignments 1.4.1 ASSIGNMENT OF COORDINATORS To fulfill the duties of the Fiscal Control and Internal Auditing Act (30 ILCS 10/2005), the Board

More information

Inapplicability to Non-Federal Sales and Use

Inapplicability to Non-Federal Sales and Use Security Industry Association 8405 Colesville Road, Suite 500 Silver Spring, MD, 20190 301-804-4705 www.securityindustry.org Submitted by email: osd.dfars@mail.mil October 19, 2018 Re: Section 889 of the

More information

How Do I: Find the Highest Elevation within an Area

How Do I: Find the Highest Elevation within an Area GeoMedia Grid: How Do I: Find the Highest Elevation within an Area Topics: Key Words: Tower Location, Site Location, Raster to Vector, and Vector to Raster Digital Elevation Models, Buffer Zone, and Zonal

More information

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection

PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection PD 7: Homeland Security Presidential Directive 7: Critical Infrastructure Identification, Prioritization, and Protection December 17, 2003 SUBJECT: Critical Infrastructure Identification, Prioritization,

More information

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014

Consideration of Issues and Directives Federal Energy Regulatory Commission Order No. 791 June 2, 2014 Federal Energy Regulatory Commission Order No. 791 June 2, 2014 67 and 76 67. For the reasons discussed below, the Commission concludes that the identify, assess, and correct language, as currently proposed

More information

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release. Description of document: Requested date: Released date: Posted date: Source of document: President's Council on Integrity and Efficiency Information (PCIE) Information Technology Investigations Sub- Committee

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

existing customer base (commercial and guidance and directives and all Federal regulations as federal) ATTACHMENT 7 BSS RISK MANAGEMENT FRAMEWORK PLAN [L.30.2.7, M.2.2.(7), G.5.6; F.2.1(41) THROUGH (76)] A7.1 BSS SECURITY REQUIREMENTS Our Business Support Systems (BSS) Risk MetTel ensures the security of

More information

Test & Evaluation of the NR-KPP

Test & Evaluation of the NR-KPP Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general

More information

Critical Information Infrastructure Protection Law

Critical Information Infrastructure Protection Law Critical Information Infrastructure Protection Law CCD COE Training 8 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington, Virginia.

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA

DISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...

More information

Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP Revision 1)

Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP Revision 1) https://www.csiac.org/ Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations (NIST SP800-171 Revision 1) Today s Presenter: Wade Kastorff SRC, Commercial Cyber Security

More information

A New Governance Plan for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)

A New Governance Plan for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) A New Governance Plan for the Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Mr. David LaBranche, PE DISDI Group Chair ODUSD(I&E) June 24, 2014 1 Overview and Background

More information

U.S. Department of Transportation. Standard

U.S. Department of Transportation. Standard U.S Department of Transportation Federal Aviation Administration U.S. Department of Transportation Federal Aviation Administration Standard DATA STANDARD FOR THE NATIONAL AIRSPACE SYSTEM (NAS) Foreword

More information

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents SMPTE AG 18:2017 Administrative Guideline SMPTE Metadata Registers Maintenance and Publication Page 1 of 20 pages Table of Contents 1 Scope 3 2 Conformance Notation 3 3 Normative References 3 4 Definitions

More information

Customer Proprietary Network Information

Customer Proprietary Network Information Customer proprietary network information (CPNI) means information that relates to the quantity, technical configuration, type, destination, location, and amount of use of our service by you and information

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

manner. IOPA conducts its reviews in conformance with Government Auditing Standards issued by the Comptroller General of the United States.

manner. IOPA conducts its reviews in conformance with Government Auditing Standards issued by the Comptroller General of the United States. PCAOB Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org The Honorable Christopher Cox Chairman Securities

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

DISDI Plenary Session

DISDI Plenary Session JSEM JSEM // Geospatial Geospatial Information Information & & Services Services Conference, Conference, 2007 2007 DISDI Plenary Session 22 22 May May 2007 2007 Columbus, Columbus, Ohio Ohio JSEM JSEM

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Deployment Deployment is the phase of the system development lifecycle in which solutions are placed into use to

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

Information Systems Security Requirements for Federal GIS Initiatives

Information Systems Security Requirements for Federal GIS Initiatives Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the

More information

DON XML Achieving Enterprise Interoperability

DON XML Achieving Enterprise Interoperability DON XML Achieving Enterprise Interoperability Overview of Policy, Governance, and Procedures for XML Development Michael Jacobs Office of the DON CIO Vision The Department of the Navy will fully exploit

More information

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats

Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information